Stochastic identification of malware with dynamic traces
DOI10.1214/13-AOAS703zbMATH Open1429.62713arXiv1404.2462OpenAlexW2032921253MaRDI QIDQ2453653FDOQ2453653
Authors: Curtis B. Storlie, Blake Anderson, Scott Vander Wiel, Daniel Quist, Curtis Hash, Nathan Brown
Publication date: 10 June 2014
Published in: The Annals of Applied Statistics (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1404.2462
Recommendations
- Malware family discovery using reversible jump MCMC sampling of regimes
- Learning to detect and classify malicious executables in the wild
- Mal-ID: automatic malware detection using common segment analysis and meta-features
- Probabilistic suffix models for API sequence analysis of windows XP applications
- A new malware classification approach based on malware dynamic analysis
splinesclassificationlogistic regressionelastic netempirical Bayesadaptive Lassomalware detectionrelaxed Lasso
Applications of statistics in engineering and industry; control charts (62P30) Generalized linear models (logistic models) (62J12)
Cites Work
- Simulation-based regularized logistic regression
- The Adaptive Lasso and Its Oracle Properties
- Least angle regression. (With discussion)
- Title not available (Why is that?)
- Regularization and Variable Selection Via the Elastic Net
- Title not available (Why is that?)
- Relaxed Lasso
- Logistic disease incidence models and case-control studies
- Multinomial Inverse Regression for Text Analysis
- The Estimation of Choice Probabilities from Choice Based Samples
- Learning to detect and classify malicious executables in the wild
- Stochastic identification of malware with dynamic traces
Cited In (6)
- Malware family discovery using reversible jump MCMC sampling of regimes
- Stochastic identification of malware with dynamic traces
- Malware clustering based on graph convolutional networks
- Probabilistic suffix models for API sequence analysis of windows XP applications
- A malware variant clustering method based on fuzzy hash
- Bayesian Models Applied to Cyber Security Anomaly Detection Problems
Uses Software
This page was built for publication: Stochastic identification of malware with dynamic traces
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2453653)